Malicious Activity Flashcards

(31 cards)

1
Q

A vulnerability that allows an attacker to run a code or module that exploits a vulnerability

A

Arbitrary Code Execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of arbitrary code execution that allows an attacker to transmit code from a remote host

A

Remote Code Execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Occurs when a user accesses or modifies specific resources that they are not entitled to normally access

A

Privilege Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A class of malware that modifies system files, often at the kernel level, to conceal its presence.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Type of network-based attack that involves maliciously repeating or delaying valid data transactions

A

Replay Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attacker alters real-time data transmissions

A

Session Hijack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unique data pieces that prevent session replay by attackers

A

Session Tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A fundamental security component that enables web applications to identity a user

A

Session Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Allow web applications to retain information about the users

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of spoofing attack where the host is disconnected and replaced by the attackers

A

Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An attacker attempts to predict the session token to hijack that session.

A

Session Prediction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Modifying the contents of a cookie to be sent a client’s browser and exploit the vulnerabilities in an application

A

Cookie Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attack where the penetration tester put the workstation logically between two hosts during the communication

A

On-path Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Occurs when an attacker captures a valid data, which is then repeated immediately or delayed and then repeated

A

Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Occurs when attackers insert themselves in between two hosts and become part of the conversation

A

Relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tricking the encryption application with an HTTP connection instead of an HTTPS connection

A

SSL Stripping

17
Q

Occurs when an attacker attempts to have a client or server abandon its higher security mode

A

Downgrade Attack

18
Q

A protocol for access and maintenance of distributed directory information services

19
Q

An attack in which LDAP statements, typically created by user input, are fabricated.

A

LDAP Injection

20
Q

A threat actor is able to execute arbitrary shell commands via a vulnerable web application

A

Command Injection

21
Q

A method of executing arbitrary code in the address space of a separate live process

A

Process Injection

22
Q

Data pieces that detect potential malicious activity on a network or system

23
Q

Signals a compromise when it’s triggered by numerous failed login attempts.

A

Account Lockout

24
Q

One user having multiple active session

A

Concurrent Session Usage

25
When users try to access or download content that security measures have prevented
Blocked Content
26
When suspicious logins occur from distant locations in a timeframe that makes physical travel between them impossible
Impossible Travel
27
Unusual resource spikes can signal a compromise
Resource Consumption
28
Inability to access certain resources, such as files, databases, or network services.
Resource Inaccessibility
29
Logging events happening at odd times when no one is supposed to be active.
Out-of-Cycle Logging
30
Attackers delete logs to cover their tracks and hinder investigations
Missing Logs
31
Attacker may publicly announce their hacks to brag about their abilities or harm the organization's reputation
Articles or Documents on Security Breach